US7653375B2 - Mobile telephone network-based system for detection and location of hazardous agents - Google Patents
Mobile telephone network-based system for detection and location of hazardous agents Download PDFInfo
- Publication number
- US7653375B2 US7653375B2 US11/743,469 US74346907A US7653375B2 US 7653375 B2 US7653375 B2 US 7653375B2 US 74346907 A US74346907 A US 74346907A US 7653375 B2 US7653375 B2 US 7653375B2
- Authority
- US
- United States
- Prior art keywords
- alarm
- hazardous agent
- cellular telephone
- vicinity
- hazardous
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 231100001261 hazardous Toxicity 0.000 title claims abstract description 61
- 238000001514 detection method Methods 0.000 title claims description 10
- 230000001413 cellular effect Effects 0.000 claims abstract description 59
- 238000000034 method Methods 0.000 claims abstract description 30
- 238000011109 contamination Methods 0.000 claims description 24
- 230000010354 integration Effects 0.000 claims description 8
- 238000004891 communication Methods 0.000 claims description 6
- 239000000126 substance Substances 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 4
- 239000012857 radioactive material Substances 0.000 claims description 4
- 230000008569 process Effects 0.000 abstract description 18
- 239000003795 chemical substances by application Substances 0.000 description 59
- 239000004165 Methyl ester of fatty acids Substances 0.000 description 7
- 230000004044 response Effects 0.000 description 6
- 238000012423 maintenance Methods 0.000 description 5
- 238000009434 installation Methods 0.000 description 4
- -1 biological Substances 0.000 description 3
- 239000000470 constituent Substances 0.000 description 2
- 238000010348 incorporation Methods 0.000 description 2
- 230000005855 radiation Effects 0.000 description 2
- 238000012935 Averaging Methods 0.000 description 1
- 230000032683 aging Effects 0.000 description 1
- 239000003124 biologic agent Substances 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 239000000356 contaminant Substances 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000001556 precipitation Methods 0.000 description 1
- 230000002285 radioactive effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/12—Details of telephonic subscriber devices including a sensor for measuring a physical value, e.g. temperature or motion
Definitions
- the present invention is related to electronic systems for the detection and location of hazardous agents and, more particularly, to such systems based upon mobile telephone networks.
- the present invention provides for a network system which is inexpensive to operate with easy installation and low maintenance costs.
- the present invention provides for a cellular telephone network-based system for detecting hazardous agents.
- the cellular telephone network is capable of physically locating cellular telephones in the network and the system has cellular telephones in public circulation with each cellular telephone having at least one detector for detecting at least one hazardous agent and broadcasting over the cellular telephone network at least one alarm packet upon detecting the hazardous agent.
- the system also has at least one computer interconnected with telephones by the cellular telephone network for processing the alarm packet and setting an alarm condition for the hazardous agent in a vicinity of the cellular telephone by calculations based upon alarm packets from other telephones with detectors for the hazardous agent in the vicinity.
- the calculations include determination of a level of contamination of the hazardous agent in the vicinity and integration over the level of contamination of the hazardous agent over the vicinity to determine whether a result of integration exceeds an alarm threshold.
- the calculations also include adjusting for the number of telephones broadcasting alarm packets for the hazardous agent in the vicinity with respect to the total number of telephones capable of detecting the hazardous agent in the vicinity.
- the present invention also provides for a method of operation in a system based on a cellular telephone network having a plurality of cellular telephones in public circulation, each cellular telephone capable of detecting one or more hazardous agents and being located by the cellular telephone network.
- the method has the steps of: receiving an alarm packet from any of the cellular telephones responsive to detection of a hazardous agent, the alarm packet including data identifying the hazardous agent and a cellular telephone base station in communication with the telephone; determining a level of contamination of the hazardous agent in the vicinity; integrating the level of contamination over the vicinity; and determining whether a resulting integration value exceeds a threshold to determine whether an alarm condition for the hazardous agent in the vicinity exists.
- the method also has the step of adjusting the level of contamination for the number of telephones broadcasting alarm packets for the hazardous agent in the vicinity with respect to the total number of telephones capable of detecting the hazardous agent in the vicinity.
- FIG. 1 is a representation of a mobile telephone network-based system according to one embodiment of the present invention
- FIG. 2 is a flow chart of operations of a cell telephone upon the detection of a hazardous agent, according to one embodiment of the present invention
- FIG. 3 is a flow chart of computer operations upon receipt of alarm packets from a cell telephone, according to one embodiment of the present invention.
- FIGS. 4A and 4B are flow charts of computer operations in alarm mode, according to one embodiment of the present invention.
- the present invention provides for a cellular, or cell, telephone network-based system using sensitive but less accurate detectors (or sensors) deployed broadly amongst the general cell telephone-carrying public.
- the network system can function as a first tier in a multi-tiered network for raising an alarm and eliciting an initial response against hazardous agents which have been released into the public environment.
- the system can produce a digital map of an agent-contaminated area and identify the most likely point of agent release. This allows a better directed secondary response to investigate a possible attack. The same map can be used to track and predict the probable spread of the contaminants. Given the uncontrolled environment in which cell telephones operate, the present invention creates the contamination map without depending on perfectly functioning cell telephones and readily accommodates increasingly capable sensors as consumers acquire newer telephones.
- the system of the present invention operates with the following general components as illustrated by the representational drawing of FIG. 1 : consumer cell telephones 10 ; services which can locate any cellular telephone 10 , such as provided by the cellular telephone base stations 12 of a cellular network 11 operating under enhanced 911 (E911) requirements; local wind velocity data, such as collected or calculated by weather services 16 ; and one or more computers 15 connected to the cellular telephone network and operating as described below.
- E911 enhanced 911
- computers 15 connected to the cellular telephone network and operating as described below.
- the cell telephones 10 which are part of the system are ordinary cellular telephones circulating in public and using the existing cellular network infrastructure. But other wireless network devices, such as 802.16 terminals, wireless LAN and BlueTooth transceivers, are possible where in common use and where the locations of the devices can be determined through the network.
- cellular or cell telephones is used to include devices which are in widespread public use, locatable, and interconnected by wireless communication networks.
- Each telephone (or device) 10 is equipped with one or more detectors capable of sensing one or more hazardous agents, including biological, chemical, or radioactive materials. In the sales of these telephones to the public, the telephones 10 are distributed so that the telephones in a given cell area have the sensing capabilities of the full spectrum of likely hazardous agents. Statistical means are used to ensure a high probability that each cell area has the full agent detection coverage.
- the telephones 10 operate automatically in accordance with the present invention.
- enhanced firmware in the telephone 10 holding the detector broadcasts alarm data packets over the cellular network 11 to indicate a danger or threat.
- the location of any telephone 10 in communication with the cellular telephone network 11 is capable of being determined by the base stations 12 of the network 11 operating under E911 standards.
- E911, or enhanced 911 is a set of requirements by the U.S. Federal Communications Commission, which imposes the capability of locating a cellular telephone within a certain resolution distance. The distance is currently 100 m, though this resolution distance may be upgraded over time.
- the present invention uses the capability of the E911 location service to rapidly locate a large number of cell telephones in a typical cell-sized region.
- the present invention also uses wind velocity data at sufficiently distributed and large number of locations so as to provide wind speed and direction information with sufficient resolution down to the size of a typical telephone cell.
- Other meteorological data which might affect agent propagation, e.g., precipitation, may also be collected for further refinement of the contamination tracking process.
- Sites from weather services 16 may provide the data.
- data from meteorological instruments located at the cell base stations 12 may be used where the potential for attack is high and/or the terrain is complicated. For open areas, weather service data which has resolution measured in hundreds of meters is sufficient.
- the present invention uses one or more computers 15 which are connected to the cell telephones through the cellular network 11 .
- the cellular network 11 includes cellular base stations 12 which are interconnected by mobile transport serving offices 14 to each other and to the ordinary public switched telephone network (PSTN).
- PSTN public switched telephone network
- the telephones 10 are connected to the Internet which, together with the PSTN, is represented by a cloud 13 in FIG. 1 .
- Only one computer 15 is shown in FIG. 1 but it is should be understood as representing a plurality of computers 15 connected to the telephones 10 through the Internet, the PSTN and the cellular network 11 .
- the computers themselves are interconnected by a network.
- the computers 15 initiate the E911 locator service, collect wind data, and create the digital contamination map, among other functions, as described in greater detail below.
- the detection of a hazardous agent by a detector in a telephone 10 starts telephone operations after the initialization step 20 , as illustrated by the flow chart of in FIG. 2 . While one alternative is to shut down all functions when the telephone is turned off, it is preferable that the detector remains on whether or not the telephone has been turned off or not.
- the detector Upon detecting the agent, the detector sends a signal to the supervisory/control unit of the telephone, as shown in step 21 . If the telephone had been turned off, the supervisory/control unit “awakens.”
- an onboard processor is then engaged to determine a confidence level C, i.e., how closely does the detector response matches known agent signature patterns that a hazardous agent has been detected. The confidence level C is checked against a threshold value in decision step 23 . If C does not exceed the threshold value, the telephone 10 is re-initialized by step 24 and is returned to the “waiting” state after the initialization step 20 .
- the supervisory/control unit under its enhanced firmware causes one or more alarm packets to be sent across the wireless network 11 to indicate the detection of a hazardous agent under step 25 .
- the alarm packets include data on the agent type, the intensity I of the detector's response to the agent; the confidence level C, the model number of the detector; its particular serial number; and the detector's age.
- the telephone 10 After waiting a fixed period under step 26 , the telephone 10 loops back to the state preceding step 22 for another determination of the confidence level C.
- the alarm packets sent by step 25 trigger operations at the receiving cellular telephone base station 12 to send the base station's identification number, along with the alarm packets to the computer 15 through the cellular network 11 .
- FIG. 3 illustrates how the computer 15 initially handles the alarm packets broadcast from the telephone 10 and base station 12 .
- FIGS. 4A and 4B chart the flow of operation of the computer 15 to determine the existence of an alarm condition, among other things.
- the flow chart in FIG. 3 begins with initialization step 30 .
- the computer 15 reads the received alarm packets from the telephone 10 and base station 12 to determine the particular agent detected and the vicinity of the telephone from the identification of the telephone cell network base station 12 in communication with the telephone in alarm.
- Vicinity refers to the area enclosing the cell of the base station 12 and the cells immediately surrounding that cell. As used in the present invention, vicinities, each centered about a base station 10 , overlap with adjacent vicinities to avoid voids in mapping and to facilitate the tracking of hazardous agents.
- step 32 determines whether a telephone has already detected that particular agent in the vicinity of the telephone cell base station 12 , by step 32 . If so, step 36 is engaged by which the alarm packets are placed into an Input Alarm Packet Queue for the particular agent and vicinity for processing by an active Alarm Mode routine, described below. The process then returns to the initialization step 30 to start the process over again.
- step 33 the E911 tracking routine is engaged to determine the locations, r, and the uncertainty in locations, ⁇ r, of all telephones which are capable of detecting that agent type in that vicinity.
- a density map D(i,j) of those telephones in the vicinity is created and maintained in next step 34 .
- the indices i,j refer to a discretized area block, each of which forms a constituent of the vicinity; m is an index to all the telephones being tracked, i.e., the telephones in the area block i,j with sensors capable of detecting the particular agent.
- Each area block i,j has an area ⁇ z 2 , the smallest area of resolution, and the sum of the areas of all the area blocks in a vicinity should equal the area of the vicinity.
- the density value D(i,j) is calculated by iteration for the area block i,j over m. For all telephones m of the area block i,j, if the block i,j falls in a circle of uncertainty radius
- centered at r(m), then D ( i,j ) D ( i,j )+( ⁇ z 2 )/( ⁇
- step 35 the Alarm Mode routine described below is launched for the alarming agent and vicinity and the process returns to the initialization step 30 to start over again.
- the Alarm Mode routine of FIGS. 4A and 4B locates the center location of a detected agent and its likely point of origin.
- the computer 15 by decision step 41 checks the status of the Input Alarm Packet Queue which is loaded by the FIG. 3 process.
- Each Input Alarm Packet Queue is particular to an agent and vicinity, the cell area enclosing the base station 10 and cell areas immediately surrounding that base station, as described previously. If there is no alarm packet in the queue, the process moves to step 55 which determines whether a sufficient amount of time has elapsed since the initial reception of previous alarm packets, i.e., packets for that agent and vicinity.
- step 56 If a sufficient amount of time has passed, the alarm status is ended, a potential false alarm is logged, a cleanup is performed by step 56 and this process is terminated by step 57 . It is assumed that the computer 15 runs a multitasking operating system in which processes are initiated and terminated as needed. This allows the possibility of simultaneous incidents in multiple vicinities to be handled by the computer 15 running several processes of the Alarm Mode routine concurrently.
- step 41 is reached if a sufficient amount of time has not passed. If by the decision step 41 , there is an alarm packet determined to be in the queue, the alarm packets are read by next step 42 to determine the agent intensity I, confidence level C, sensor model identification, the sensor's serial number and its age. In step 43 , the position r of the telephone which sent the alarm packet and the telephone's position uncertainty ⁇ r is determined from the E911 tracking list. Then by step 44 a decision is made whether the current packets are from a telephone which is already on an Active Telephone List.
- a threat credibility weighting factor W is determined by step 46 from the alarm packet data on the sensor model, its serial number, age, and current data on the reliability of that sensor, its relative performance, and the effects of aging upon that sensor model. Note that more current data can be uploaded into the computers 15 as more information on the telephone sensors becomes available. Step 47 then pushes the alarm packet data, threat credibility weighting factor W and the telephone location r onto the Active Telephone List and a contamination map is created by step 48 .
- a contamination value X(i,j) is created from the agent intensity I, confidence level C, threat credibility weighting factor W and the uncertainty ⁇ r in the location of each telephone.
- step 44 if the alarm packet under consideration is from a telephone which is already on the Active Telephone List, then the process branches to step 45 by which the Active Telephone List is updated with current alarm packet information. The previous location r, agent intensity I, confidence level C data from the telephone are overwritten by the present data of the telephone under consideration. Then the process moves to step 48 where the contamination map with contamination values X(i,j) are calculated, as explained previously.
- Step 49 follows step 48 .
- the contamination values X(i,j) are reduced in proportion to the density of similar sensors D(i,j) in each area block i,j so as to remove any skew due to variations in the density of cellular telephones. For example, three telephones in alarm in an area with only three telephones should weigh more heavily than an area with 20 telephones and only three in alarm.
- step 50 integrates the contamination values X(i,j) over all constituent area blocks i,j in the vicinity, i.e., the area of the cell covered by the cell base station and surrounding cell areas. It should be noted again that the cell telephones 10 in alarm whose cell base stations 12 are surrounded by different cell base stations 12 are tracked by separate processes of the Alarm Mode routine and separate containment maps are created.
- the result is compared with a predetermined threshold value T by decision step 51 . If the threshold value T is exceeded, a weighted averaging of X(i,j) is calculated in step 52 to find the likely center location of the detected hazardous agent. That is,
- r ⁇ ( center ) ⁇ i , j ⁇ X ⁇ ( i , j ) * r ⁇ ( i , j ) X ⁇ ( i , j )
- step 53 the center location of hazardous agent is extrapolated to the probable origin, such as a point of deliberate release, of the hazardous agent from the best available wind velocity data and the elapsed time since the reception of the first alarm packet. Then an alert is issued in step 54 to any organization or team assigned to respond to the detected hazardous agent. Software which tracks the hazardous agent is also launched. Then the process is terminated by step 57 .
- the cell phones 10 continue to broadcast alarm packets and the alarm processing routine described with respect to FIG. 3 continues to the packets onto the Alarm Packet Queues. These later packets are handled by a separate agent tracking routine (not presently detailed) launched in step 54 .
- step 51 if the threshold value T is not exceeded, the process returns to step 41 .
- the present invention offers an inexpensive, easily installed, low-maintenance network system for is
- the present invention provides for a network system which is inexpensive to operate with easy installation and low maintenance costs for the detection and location of hazardous agents which have been loosened onto the public, intentionally or not.
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
A system for detecting hazardous agents is based on cellular telephone networks. The cellular telephones in public circulation have at least one detector for detecting at least one hazardous agent and broadcast alarm packets upon detecting the hazardous agent. A computer or computer network interconnected with telephones by the cellular telephone network processes the alarm packets and sets an alarm condition for the hazardous agent in a vicinity of the cellular telephone by calculations based upon alarm packets from other telephones with detectors for the hazardous agent in the vicinity. A map of the contaminated area is also created.
Description
The present application is a continuation of U.S. application Ser. No. 10/961,474 filed Oct. 8, 2004, the contents of which are incorporated by reference herein in their entirety for all purposes.
The present invention is related to electronic systems for the detection and location of hazardous agents and, more particularly, to such systems based upon mobile telephone networks.
Sources of hazardous agents, such as biological, chemical, and radioactive materials, are plentiful in modern society and the possibilities of their release must be faced. Furthermore, given the present threat of terrorism, the dangers of the purposeful release of these agents is also a real possibility. Hence there is the need for a network of ubiquitous detectors which are capable of sensing such biological, chemical, and radioactive agents.
Various networks, detectors and combinations of networks and detectors have been proposed in response. One proposal has been the deployment of such detectors in simple combination with, or as an integral part of, cellular (or cell) telephones. Cell telephones are ubiquitous in modern societies and are transported everywhere. As normally used telephones, the telephone owners are likely to keep the telephones charged and in good working order. Canadian Patent No. 2,418,612, which issued to Marian Gavrila and Gabriel Patulea, describes the incorporation of chemical, radiation, and biological agent detectors in cell phones and U.S. Pat. No. 6,697,645, which issued to J. M. MacFarlane, discloses the incorporation of environmental sensors into cellular phones.
Efforts at numerous national laboratories, universities, and businesses have focused mostly on sensor development. For example, Lawrence Livermore National Laboratory is currently developing radiation detectors which can be embedded in PDA (Personal Digital Assistant)/cell telephone devices which are part of a wireless network known as RadNet. These devices are to be deployed with specially trained personnel, such as firefighters, utility workers, police, and custom agents, as a first response team. But the relatively low number of such people compared to the general population means that the detectors, or sensors, must necessarily be highly sensitive and accurate. These requirements imply that deployment of such a network system is likely to be many years away. Other efforts include research on wireless networks of autonomous sensor devices; e.g., Graviton Corp. of San Diego is developing a network independent of existing cell telephone infrastructures.
Despite these efforts, these network systems suffer from various deficiencies, such as lack of geographical coverage, and high costs of installation and maintenance. The distribution of detectors/cell telephones to special personnel limits the distribution of the sensor network. Sensitive and accurate detectors raise the initial and maintenance costs of the sensor/PDA/cell telephone (or autonomous sensor) devices and the installation of special wireless networks further adds the total of network system costs.
On the other hand, the present invention provides for a network system which is inexpensive to operate with easy installation and low maintenance costs.
The present invention provides for a cellular telephone network-based system for detecting hazardous agents. The cellular telephone network is capable of physically locating cellular telephones in the network and the system has cellular telephones in public circulation with each cellular telephone having at least one detector for detecting at least one hazardous agent and broadcasting over the cellular telephone network at least one alarm packet upon detecting the hazardous agent. The system also has at least one computer interconnected with telephones by the cellular telephone network for processing the alarm packet and setting an alarm condition for the hazardous agent in a vicinity of the cellular telephone by calculations based upon alarm packets from other telephones with detectors for the hazardous agent in the vicinity. The calculations include determination of a level of contamination of the hazardous agent in the vicinity and integration over the level of contamination of the hazardous agent over the vicinity to determine whether a result of integration exceeds an alarm threshold. The calculations also include adjusting for the number of telephones broadcasting alarm packets for the hazardous agent in the vicinity with respect to the total number of telephones capable of detecting the hazardous agent in the vicinity.
The present invention also provides for a method of operation in a system based on a cellular telephone network having a plurality of cellular telephones in public circulation, each cellular telephone capable of detecting one or more hazardous agents and being located by the cellular telephone network. The method has the steps of: receiving an alarm packet from any of the cellular telephones responsive to detection of a hazardous agent, the alarm packet including data identifying the hazardous agent and a cellular telephone base station in communication with the telephone; determining a level of contamination of the hazardous agent in the vicinity; integrating the level of contamination over the vicinity; and determining whether a resulting integration value exceeds a threshold to determine whether an alarm condition for the hazardous agent in the vicinity exists. The method also has the step of adjusting the level of contamination for the number of telephones broadcasting alarm packets for the hazardous agent in the vicinity with respect to the total number of telephones capable of detecting the hazardous agent in the vicinity.
The present invention provides for a cellular, or cell, telephone network-based system using sensitive but less accurate detectors (or sensors) deployed broadly amongst the general cell telephone-carrying public. The network system can function as a first tier in a multi-tiered network for raising an alarm and eliciting an initial response against hazardous agents which have been released into the public environment. The system can produce a digital map of an agent-contaminated area and identify the most likely point of agent release. This allows a better directed secondary response to investigate a possible attack. The same map can be used to track and predict the probable spread of the contaminants. Given the uncontrolled environment in which cell telephones operate, the present invention creates the contamination map without depending on perfectly functioning cell telephones and readily accommodates increasingly capable sensors as consumers acquire newer telephones.
The system of the present invention operates with the following general components as illustrated by the representational drawing of FIG. 1 : consumer cell telephones 10; services which can locate any cellular telephone 10, such as provided by the cellular telephone base stations 12 of a cellular network 11 operating under enhanced 911 (E911) requirements; local wind velocity data, such as collected or calculated by weather services 16; and one or more computers 15 connected to the cellular telephone network and operating as described below.
The cell telephones 10 which are part of the system are ordinary cellular telephones circulating in public and using the existing cellular network infrastructure. But other wireless network devices, such as 802.16 terminals, wireless LAN and BlueTooth transceivers, are possible where in common use and where the locations of the devices can be determined through the network. Hence the term, cellular or cell telephones, is used to include devices which are in widespread public use, locatable, and interconnected by wireless communication networks.
Each telephone (or device) 10 is equipped with one or more detectors capable of sensing one or more hazardous agents, including biological, chemical, or radioactive materials. In the sales of these telephones to the public, the telephones 10 are distributed so that the telephones in a given cell area have the sensing capabilities of the full spectrum of likely hazardous agents. Statistical means are used to ensure a high probability that each cell area has the full agent detection coverage.
The telephones 10 operate automatically in accordance with the present invention. Upon detection of a dangerous agent by a detector, enhanced firmware in the telephone 10 holding the detector broadcasts alarm data packets over the cellular network 11 to indicate a danger or threat. The location of any telephone 10 in communication with the cellular telephone network 11 is capable of being determined by the base stations 12 of the network 11 operating under E911 standards. E911, or enhanced 911, is a set of requirements by the U.S. Federal Communications Commission, which imposes the capability of locating a cellular telephone within a certain resolution distance. The distance is currently 100 m, though this resolution distance may be upgraded over time. The present invention uses the capability of the E911 location service to rapidly locate a large number of cell telephones in a typical cell-sized region.
The present invention also uses wind velocity data at sufficiently distributed and large number of locations so as to provide wind speed and direction information with sufficient resolution down to the size of a typical telephone cell. Other meteorological data which might affect agent propagation, e.g., precipitation, may also be collected for further refinement of the contamination tracking process. Sites from weather services 16 may provide the data. Alternatively or concurrently with weather service data, data from meteorological instruments located at the cell base stations 12 may be used where the potential for attack is high and/or the terrain is complicated. For open areas, weather service data which has resolution measured in hundreds of meters is sufficient.
Finally, the present invention uses one or more computers 15 which are connected to the cell telephones through the cellular network 11. As represented in FIG. 1 , the cellular network 11 includes cellular base stations 12 which are interconnected by mobile transport serving offices 14 to each other and to the ordinary public switched telephone network (PSTN). Through the PSTN the telephones 10 are connected to the Internet which, together with the PSTN, is represented by a cloud 13 in FIG. 1 . Only one computer 15 is shown in FIG. 1 but it is should be understood as representing a plurality of computers 15 connected to the telephones 10 through the Internet, the PSTN and the cellular network 11. Preferably the computers themselves are interconnected by a network. The computers 15 initiate the E911 locator service, collect wind data, and create the digital contamination map, among other functions, as described in greater detail below.
The detection of a hazardous agent by a detector in a telephone 10 starts telephone operations after the initialization step 20, as illustrated by the flow chart of in FIG. 2 . While one alternative is to shut down all functions when the telephone is turned off, it is preferable that the detector remains on whether or not the telephone has been turned off or not. Upon detecting the agent, the detector sends a signal to the supervisory/control unit of the telephone, as shown in step 21. If the telephone had been turned off, the supervisory/control unit “awakens.” Under step 22, an onboard processor is then engaged to determine a confidence level C, i.e., how closely does the detector response matches known agent signature patterns that a hazardous agent has been detected. The confidence level C is checked against a threshold value in decision step 23. If C does not exceed the threshold value, the telephone 10 is re-initialized by step 24 and is returned to the “waiting” state after the initialization step 20.
If the confidence level C exceeds the threshold value, the supervisory/control unit under its enhanced firmware causes one or more alarm packets to be sent across the wireless network 11 to indicate the detection of a hazardous agent under step 25. The alarm packets include data on the agent type, the intensity I of the detector's response to the agent; the confidence level C, the model number of the detector; its particular serial number; and the detector's age. After waiting a fixed period under step 26, the telephone 10 loops back to the state preceding step 22 for another determination of the confidence level C. The alarm packets sent by step 25 trigger operations at the receiving cellular telephone base station 12 to send the base station's identification number, along with the alarm packets to the computer 15 through the cellular network 11.
The flow chart of FIG. 3 illustrates how the computer 15 initially handles the alarm packets broadcast from the telephone 10 and base station 12. FIGS. 4A and 4B chart the flow of operation of the computer 15 to determine the existence of an alarm condition, among other things.
The flow chart in FIG. 3 begins with initialization step 30. In following step 31, the computer 15 reads the received alarm packets from the telephone 10 and base station 12 to determine the particular agent detected and the vicinity of the telephone from the identification of the telephone cell network base station 12 in communication with the telephone in alarm. Vicinity refers to the area enclosing the cell of the base station 12 and the cells immediately surrounding that cell. As used in the present invention, vicinities, each centered about a base station 10, overlap with adjacent vicinities to avoid voids in mapping and to facilitate the tracking of hazardous agents.
The computer determines whether a telephone has already detected that particular agent in the vicinity of the telephone cell base station 12, by step 32. If so, step 36 is engaged by which the alarm packets are placed into an Input Alarm Packet Queue for the particular agent and vicinity for processing by an active Alarm Mode routine, described below. The process then returns to the initialization step 30 to start the process over again.
If not, i.e., the agent alarm in that vicinity is new, the process moves to step 33 in which the E911 tracking routine is engaged to determine the locations, r, and the uncertainty in locations, Δr, of all telephones which are capable of detecting that agent type in that vicinity. A density map D(i,j) of those telephones in the vicinity is created and maintained in next step 34. The indices i,j refer to a discretized area block, each of which forms a constituent of the vicinity; m is an index to all the telephones being tracked, i.e., the telephones in the area block i,j with sensors capable of detecting the particular agent. Each area block i,j has an area Δz2, the smallest area of resolution, and the sum of the areas of all the area blocks in a vicinity should equal the area of the vicinity.
The density value D(i,j) is calculated by iteration for the area block i,j over m. For all telephones m of the area block i,j, if the block i,j falls in a circle of uncertainty radius |Δr(m)| centered at r(m), then
D(i,j)=D(i,j)+(Δz 2)/(π|Δr(m)|2).
D(i,j)=D(i,j)+(Δz 2)/(π|Δr(m)|2).
The greater the uncertainty in the location of telephone m, the smaller its presence in the area block i,j is presumed to be. If the location r of telephone m is in area block i,j and it is certain that that telephone is in that area block, i.e., the uncertainty in location Δr is such that area of uncertainty π Δr2 is a minimum, or equal to Δz2, the density D(i,j) is incremented by one. Integrating D(i,j) over a vicinity yields the number of telephones in the vicinity.
Then by step 35 the Alarm Mode routine described below is launched for the alarming agent and vicinity and the process returns to the initialization step 30 to start over again.
The Alarm Mode routine of FIGS. 4A and 4B locates the center location of a detected agent and its likely point of origin. After initialization step 40, the computer 15 by decision step 41 checks the status of the Input Alarm Packet Queue which is loaded by the FIG. 3 process. Each Input Alarm Packet Queue is particular to an agent and vicinity, the cell area enclosing the base station 10 and cell areas immediately surrounding that base station, as described previously. If there is no alarm packet in the queue, the process moves to step 55 which determines whether a sufficient amount of time has elapsed since the initial reception of previous alarm packets, i.e., packets for that agent and vicinity. If a sufficient amount of time has passed, the alarm status is ended, a potential false alarm is logged, a cleanup is performed by step 56 and this process is terminated by step 57. It is assumed that the computer 15 runs a multitasking operating system in which processes are initiated and terminated as needed. This allows the possibility of simultaneous incidents in multiple vicinities to be handled by the computer 15 running several processes of the Alarm Mode routine concurrently.
Returning to the decision step 55 in the process at hand, step 41 is reached if a sufficient amount of time has not passed. If by the decision step 41, there is an alarm packet determined to be in the queue, the alarm packets are read by next step 42 to determine the agent intensity I, confidence level C, sensor model identification, the sensor's serial number and its age. In step 43, the position r of the telephone which sent the alarm packet and the telephone's position uncertainty Δr is determined from the E911 tracking list. Then by step 44 a decision is made whether the current packets are from a telephone which is already on an Active Telephone List. If not, then a threat credibility weighting factor W is determined by step 46 from the alarm packet data on the sensor model, its serial number, age, and current data on the reliability of that sensor, its relative performance, and the effects of aging upon that sensor model. Note that more current data can be uploaded into the computers 15 as more information on the telephone sensors becomes available. Step 47 then pushes the alarm packet data, threat credibility weighting factor W and the telephone location r onto the Active Telephone List and a contamination map is created by step 48.
For each area block i,j and particular alarming agent, a contamination value X(i,j) is created from the agent intensity I, confidence level C, threat credibility weighting factor W and the uncertainty Δr in the location of each telephone. X(i,j) is calculated iteratively for all the telephones in the Active Telephone List indexed by k, with the equation:
X(i,j)=X(i,j)+I(k)*C(k)*W(k)*F(k)
X(i,j)=X(i,j)+I(k)*C(k)*W(k)*F(k)
where F(k) is a factor ˜1/π|Δr(k)|2. Note that the contamination value increases with increasing agent intensity, confidence and credibility, and decreases with the uncertainty in telephone location, as might be expected.
Returning to the decision step 44, if the alarm packet under consideration is from a telephone which is already on the Active Telephone List, then the process branches to step 45 by which the Active Telephone List is updated with current alarm packet information. The previous location r, agent intensity I, confidence level C data from the telephone are overwritten by the present data of the telephone under consideration. Then the process moves to step 48 where the contamination map with contamination values X(i,j) are calculated, as explained previously.
Returning to the present process, the result is compared with a predetermined threshold value T by decision step 51. If the threshold value T is exceeded, a weighted averaging of X(i,j) is calculated in step 52 to find the likely center location of the detected hazardous agent. That is,
In step 53 the center location of hazardous agent is extrapolated to the probable origin, such as a point of deliberate release, of the hazardous agent from the best available wind velocity data and the elapsed time since the reception of the first alarm packet. Then an alert is issued in step 54 to any organization or team assigned to respond to the detected hazardous agent. Software which tracks the hazardous agent is also launched. Then the process is terminated by step 57. Again, it should be noted that the cell phones 10 continue to broadcast alarm packets and the alarm processing routine described with respect to FIG. 3 continues to the packets onto the Alarm Packet Queues. These later packets are handled by a separate agent tracking routine (not presently detailed) launched in step 54.
Returning to the decision step 51, if the threshold value T is not exceeded, the process returns to step 41.
Thus the present invention offers an inexpensive, easily installed, low-maintenance network system for is On the other hand, the present invention provides for a network system which is inexpensive to operate with easy installation and low maintenance costs for the detection and location of hazardous agents which have been loosened onto the public, intentionally or not.
Therefore, while the description above provides a full and complete disclosure of the preferred embodiments of the present invention, various modifications, alternate constructions, and equivalents will be obvious to those with skill in the art. Thus, the scope of the present invention is limited solely by the metes and bounds of the appended claims.
Claims (19)
1. A cellular telephone network-based system for detecting hazardous agents, said cellular telephone network capable of locating cellular telephones in said network, said system comprising
a plurality of cellular telephones in public circulation, each cellular telephone having at least one detector for detecting at least one hazardous agent, said cellular telephone broadcasting over said cellular telephone network at least one alarm packet upon detecting said hazardous agent; and
at least one computer interconnected with said plurality of telephones by said cellular telephone network for processing said alarm packet and setting an alarm condition for said hazardous agent in a vicinity of said cellular telephone configured to calculate based upon alarm packets from other telephones with detectors for said hazardous agent in said vicinity, said calculations including determination of a level of contamination of said hazardous agent in said vicinity and integration of said level of contamination of said hazardous agent over said vicinity, with bias due to variations in cellular telephone density over said vicinity removed, to determine whether a result of integration exceeds an alarm threshold.
2. The system of claim 1 wherein said calculations include determination of a level of contamination of said hazardous agent in said vicinity and integration over said level of contamination of said hazardous agent over said vicinity to determine whether a result of integration exceeds an alarm threshold.
3. The system of claim 1 wherein said calculations include adjusting for the age of said at least one detector of said cellular telephone in alarm.
4. The system of claim 1 wherein said calculations include adjusting for the reliability of said at least one detector of said cellular telephone in alarm.
5. The system of claim 1 wherein said computer further creates a map of area contaminated by said hazardous agent.
6. The system of claim 5 wherein said computer further determines a likely origin of said hazardous agent.
7. The system of claim 6 wherein said computer determines said likely origin of said hazardous agent from wind velocity data.
8. The system of claim 7 wherein said computer further predicts spread of said hazardous agent from said wind velocity data.
9. The system of claim 1 wherein said hazardous agent comprises biological, chemical or radioactive material.
10. The system of claim 1 wherein said calculations include compensating for any uncertainty in telephone locations.
11. In a system based on a cellular telephone network having a plurality of cellular telephones in public circulation, each cellular telephone capable of detecting one or more hazardous agents and being located by said cellular telephone network, a method comprising
receiving an alarm packet from any of said cellular telephones in public circulation responsive to detection of a hazardous agent, parsing said alarm packets to remove identifying data of said hazardous agent and a cellular telephone base station in communication with said telephone;
determining a level of contamination of said hazardous agent in said vicinity from alarm packets from other telephones in said vicinity based on said identifying data;
mathematically integrating said level of contamination over said vicinity, including eliminating bias due to variations in cellular telephone density over said vicinity; and
determining whether a resulting integration value exceeds a threshold to determine whether an alarm condition for said hazardous agent in said vicinity exists.
12. The method of claim 11 wherein said contamination level determining step includes accounting for the age of a detector in a cellular telephone in alarm.
13. The method of claim 11 wherein said contamination level determining step includes accounting for the reliability of a detector in a cellular telephone in alarm from reliability data.
14. The method of claim 11 further comprising creating a map of area contaminated by said hazardous agent.
15. The method of claim 11 further comprising determining a likely origin of said hazardous agent.
16. The method of claim 15 wherein said likely origin determining step includes using wind velocity data.
17. The method of claim 16 further comprising predicting spread of said hazardous agent from said wind velocity data.
18. The method of claim 11 wherein said hazardous agent comprises biological, chemical or radioactive material.
19. The method of claim 11 wherein said contamination level determining step includes compensating for any uncertainty in telephone locations.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/743,469 US7653375B2 (en) | 2004-10-08 | 2007-05-02 | Mobile telephone network-based system for detection and location of hazardous agents |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/961,474 US7221934B2 (en) | 2004-10-08 | 2004-10-08 | Mobile telephone network-based system for detection and location of hazardous agents |
US11/743,469 US7653375B2 (en) | 2004-10-08 | 2007-05-02 | Mobile telephone network-based system for detection and location of hazardous agents |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/961,474 Continuation US7221934B2 (en) | 2004-10-08 | 2004-10-08 | Mobile telephone network-based system for detection and location of hazardous agents |
Publications (2)
Publication Number | Publication Date |
---|---|
US20070232296A1 US20070232296A1 (en) | 2007-10-04 |
US7653375B2 true US7653375B2 (en) | 2010-01-26 |
Family
ID=36145991
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/961,474 Expired - Fee Related US7221934B2 (en) | 2004-10-08 | 2004-10-08 | Mobile telephone network-based system for detection and location of hazardous agents |
US11/743,469 Expired - Lifetime US7653375B2 (en) | 2004-10-08 | 2007-05-02 | Mobile telephone network-based system for detection and location of hazardous agents |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/961,474 Expired - Fee Related US7221934B2 (en) | 2004-10-08 | 2004-10-08 | Mobile telephone network-based system for detection and location of hazardous agents |
Country Status (1)
Country | Link |
---|---|
US (2) | US7221934B2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090322511A1 (en) * | 2008-06-30 | 2009-12-31 | Lava Three, LLC | System for controlling the operation of both wireless multicasting systems and alarm systems to distribute an alarm indication to a dynamically configured coverage area |
US20090325536A1 (en) * | 2008-06-30 | 2009-12-31 | Lava Three, LLC | System for controlling the operation of wireless multicasting systems to distribute an alarm indication to a dynamically configured coverage area |
US20090322523A1 (en) * | 2008-06-30 | 2009-12-31 | Lava Three, LLC | System for distributing an alarm indication to a dynamically configured set of alarm systems |
US8384542B1 (en) | 2010-04-16 | 2013-02-26 | Kontek Industries, Inc. | Autonomous and federated sensory subsystems and networks for security systems |
US8688071B1 (en) * | 2012-12-12 | 2014-04-01 | At&T Intellectual Property I, L.P. | Donut alert messaging |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7937080B2 (en) * | 2004-02-17 | 2011-05-03 | Eaton Corporation | Wireless measurement device |
US7746226B2 (en) * | 2007-03-30 | 2010-06-29 | International Business Machines Corporation | System and method for providing dynamic presence information as collected by a mobile device |
US8427309B2 (en) * | 2009-06-15 | 2013-04-23 | Qualcomm Incorporated | Sensor network management |
CN101958965A (en) * | 2010-05-31 | 2011-01-26 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for earthquake early warning |
US20130012154A1 (en) * | 2011-07-08 | 2013-01-10 | Shortcode7 LLC | Alert system and method |
CA2853109C (en) * | 2011-10-24 | 2019-02-26 | Helmholtz Zentrum Munchen Deutsches Forschungszentrum Fur Gesundheit Und Umwelt (Gmbh) | Method for measuring radiation by means of an electronic terminal having a digital camera |
FI124561B (en) * | 2012-06-26 | 2014-10-15 | Lahden 4G Service Oy | Position-based observation and control of the environment |
CN103399340A (en) * | 2013-07-31 | 2013-11-20 | 浙江每日互动网络科技有限公司 | Mobile-terminal-based real-time earthquake monitoring method and system |
US11297089B2 (en) * | 2018-05-02 | 2022-04-05 | Blackberry Limited | Providing secure sensor data to automated machines |
CN109684427A (en) * | 2018-12-06 | 2019-04-26 | 武汉虹旭信息技术有限责任公司 | Map monitoring warning system and its method based on mobile Internet harmful information |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6578416B1 (en) | 1999-09-09 | 2003-06-17 | Labarge, Inc. | Fuel system |
US20030154044A1 (en) | 2001-07-23 | 2003-08-14 | Lundstedt Alan P. | On-site analysis system with central processor and method of analyzing |
US20030194350A1 (en) * | 2002-04-11 | 2003-10-16 | Siemens Information And Communication Networks | Public health threat surveillance system |
US20030234725A1 (en) * | 2002-06-21 | 2003-12-25 | Lemelson Jerome H. | Intelligent bulding alarm |
US20040189976A1 (en) * | 2002-10-31 | 2004-09-30 | Burns Joseph D. | Method, apparatus and system for sensing air borne hazardous materials |
US20040204915A1 (en) * | 2002-07-19 | 2004-10-14 | Cyrano Sciences Inc. | Chemical and biological agent sensor array detectors |
US20050085257A1 (en) | 2003-10-01 | 2005-04-21 | Laird Mark D. | Mobile emergency notification system |
US20050181791A1 (en) | 1996-12-12 | 2005-08-18 | Mielke Mark P. | Method and apparatus for updating a mobile unit |
US20050206506A1 (en) | 2002-07-19 | 2005-09-22 | Kulesz James J | System for detection of hazardous events |
US20050264412A1 (en) * | 2004-05-12 | 2005-12-01 | Raytheon Company | Event alert system and method |
US20080065050A1 (en) * | 2003-05-27 | 2008-03-13 | Integrated Sensing Systems | Device and method for detecting and treating chemical and biological agents |
-
2004
- 2004-10-08 US US10/961,474 patent/US7221934B2/en not_active Expired - Fee Related
-
2007
- 2007-05-02 US US11/743,469 patent/US7653375B2/en not_active Expired - Lifetime
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050181791A1 (en) | 1996-12-12 | 2005-08-18 | Mielke Mark P. | Method and apparatus for updating a mobile unit |
US6578416B1 (en) | 1999-09-09 | 2003-06-17 | Labarge, Inc. | Fuel system |
US20030154044A1 (en) | 2001-07-23 | 2003-08-14 | Lundstedt Alan P. | On-site analysis system with central processor and method of analyzing |
US20030194350A1 (en) * | 2002-04-11 | 2003-10-16 | Siemens Information And Communication Networks | Public health threat surveillance system |
US20030234725A1 (en) * | 2002-06-21 | 2003-12-25 | Lemelson Jerome H. | Intelligent bulding alarm |
US20040204915A1 (en) * | 2002-07-19 | 2004-10-14 | Cyrano Sciences Inc. | Chemical and biological agent sensor array detectors |
US20050206506A1 (en) | 2002-07-19 | 2005-09-22 | Kulesz James J | System for detection of hazardous events |
US20040189976A1 (en) * | 2002-10-31 | 2004-09-30 | Burns Joseph D. | Method, apparatus and system for sensing air borne hazardous materials |
US20080065050A1 (en) * | 2003-05-27 | 2008-03-13 | Integrated Sensing Systems | Device and method for detecting and treating chemical and biological agents |
US20050085257A1 (en) | 2003-10-01 | 2005-04-21 | Laird Mark D. | Mobile emergency notification system |
US20050264412A1 (en) * | 2004-05-12 | 2005-12-01 | Raytheon Company | Event alert system and method |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090322511A1 (en) * | 2008-06-30 | 2009-12-31 | Lava Three, LLC | System for controlling the operation of both wireless multicasting systems and alarm systems to distribute an alarm indication to a dynamically configured coverage area |
US20090325536A1 (en) * | 2008-06-30 | 2009-12-31 | Lava Three, LLC | System for controlling the operation of wireless multicasting systems to distribute an alarm indication to a dynamically configured coverage area |
US20090322523A1 (en) * | 2008-06-30 | 2009-12-31 | Lava Three, LLC | System for distributing an alarm indication to a dynamically configured set of alarm systems |
US8391826B2 (en) * | 2008-06-30 | 2013-03-05 | Lava Three, LLC | System for controlling the operation of wireless multicasting systems to distribute an alarm indication to a dynamically configured coverage area |
US8391827B2 (en) * | 2008-06-30 | 2013-03-05 | Lava Three, LLC | System for controlling the operation of both wireless multicasting systems and alarm systems to distribute an alarm indication to a dynamically configured coverage area |
US8384542B1 (en) | 2010-04-16 | 2013-02-26 | Kontek Industries, Inc. | Autonomous and federated sensory subsystems and networks for security systems |
US8688071B1 (en) * | 2012-12-12 | 2014-04-01 | At&T Intellectual Property I, L.P. | Donut alert messaging |
US20140162591A1 (en) * | 2012-12-12 | 2014-06-12 | At&T Intellectual Property I, Lp | Donut Alert Messaging |
US8923807B2 (en) * | 2012-12-12 | 2014-12-30 | At&T Intellectual Property I, L.P. | Donut alert messaging |
Also Published As
Publication number | Publication date |
---|---|
US7221934B2 (en) | 2007-05-22 |
US20070232296A1 (en) | 2007-10-04 |
US20060079208A1 (en) | 2006-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7653375B2 (en) | Mobile telephone network-based system for detection and location of hazardous agents | |
US8502670B2 (en) | Real-time RFID positioning system and method, repeater installation method therefor, position confirmation service system using the same | |
AU2015207935B2 (en) | Vessel performance optimization reporting tool | |
US8762060B2 (en) | Pervasive network for environmental sensing | |
CN101204115B (en) | Apparatus and method for associating a geographical position with an event occurring on a wireless device | |
US8026846B2 (en) | Mobile radiation surveillance network | |
EP1461637B1 (en) | Method and apparatus for locating mobile units tracking another | |
JP4262129B2 (en) | Weather forecasting system | |
CN102804688A (en) | Method for middleware of a sensor network | |
CN101365958A (en) | Apparatus and methods for geographic position approximation of an event occurring on a wireless device | |
US20040015336A1 (en) | Automatic detection and assessment of chemical, biological, radiological and nuclear threats | |
US20040012491A1 (en) | System for detection of hazardous events | |
US10559177B2 (en) | Area and property monitoring system and method | |
US20080205324A1 (en) | Networked Communications and Early Warning System | |
CN101975963A (en) | Tracking implementing geopositioning and local modes | |
CN102754420A (en) | Alert warning method | |
JP6740731B2 (en) | Communication device, data collection method, program, and safety confirmation system | |
RU63094U1 (en) | SYSTEM FOR DETERMINING THE LOCATION OF MOBILE OBJECTS | |
KR100701128B1 (en) | Equipment and method for collecting traffic information using broadcast | |
JP2003185761A (en) | Environmental data measuring system, environmental data processing server, environmental data measuring apparatus, cellular phone loaded therewith, program for controlling processing server, and program for controlling cellular phone | |
KR20120140117A (en) | Usn based low power emergency communication system | |
RU2244641C1 (en) | Information-security system for vehicles and immovable property objects | |
CN117041331B (en) | Fire alarm system and method thereof | |
US10972875B2 (en) | System and method of alternative tracking upon disabling of monitoring device | |
KR102452820B1 (en) | Integrated information sensing solar system for public life safety |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: KISWE MOBILE INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KIM, JEONG;HO, YUNG-LUNG;REEL/FRAME:042619/0103 Effective date: 20170602 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2553); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 12 |